Cyberattacks are on the rise in computer networks across the country, leaving many schools scrambling to contain threats and educate communities on device etiquette. To get a better sense of what鈥檚 working to address this challenge, 澳门跑狗论坛 partnered with the Consortium for School Networking, or CoSN, to survey 513 K-12 technology leaders on how they are dealing with the latest cybersecurity challenges. 澳门跑狗论坛 followed up with interviews of chief technology officers to better understand what approaches are working to curb and clean up cyberattacks. Here are four key areas ed-tech leaders should address:
Training
The survey of K-12 technology leaders featured a list of techniques for dealing with cybersecurity challenges, asking them to mark 鈥測es鈥 for the ones that apply and 鈥渘o鈥 for the ones that don鈥檛. Techniques involving training ranked highest: 77 percent of respondents said they鈥檙e training IT staff, 69 percent said they鈥檙e encouraging staff members to upgrade passwords, and 63 percent said they鈥檙e working on training end users, such as teachers and students.
A little more than a year ago, Keith Bockwoldt was promoted to chief information officer for Hinsdale Township High School District 86 in Illinois. Only a few months after he started in the role, a teacher clicked on an email that purported to be from a former student. It ended up creating a malware infection that required Bockwoldt to tap into cybersecurity insurance for the first time in his 21 years working in the district.
That experience underscored for him the importance of arming teachers with knowledge of real-world situations in which they can play a major role. Bockwoldt started offering lessons to teachers during their prep periods, showing them videos that opened a window into a day in the life of a hacker.
鈥淭hey were like, 鈥榃ow, that really happens,鈥 鈥 Bockwoldt said. 鈥淚t really gave them an awareness.鈥
Bockwoldt naturally has had more success getting through to teachers when he speaks 鈥渋n layman鈥檚 terms鈥 rather than overloading them with tech jargon. He also recommends getting the board of education involved in the discussions.
Melissa Tebbenkamp, the director of instructional technology for the Raytown Quality schools in Missouri, said her team tries to engage teachers with humor, tossing memes into short weekly emails to keep the issues top of mind throughout the year.
Training has made a difference, Bockwoldt said. He鈥檚 started getting more suspicious emails forwarded to him from teachers who haven鈥檛 opened them.
Purchasing
Tackling cybersecurity often means acknowledging areas where the school needs outside help. Sixty-three percent of respondents to the CoSN/澳门跑狗论坛 survey said they鈥檙e purchasing specific cybersecurity products and services.
Diane Doersch, who retired last year as chief technology and information officer for the Green Bay public schools in Wisconsin, likes the tool ClassLink, which provides single sign-on infrastructure for online applications, keeping the data secure. In general, she found that the most valuable way to get the most out of products was to meet regularly with the companies that provide them.
鈥淚 had quarterly meetings with the company that provided our firewall,鈥 Doersch said. 鈥淭hey had the very specifics on how many times your district was pinged by a foreign nation.鈥
Tebbenkamp is less bullish on the potential for outside companies to help schools. 鈥淭here鈥檚 a lot of products and services out on the market that aren鈥檛 a good fit for us,鈥 she said. 鈥淓very district should take the time to evaluate whether it鈥檚 a good fit.鈥
She鈥檚 found that many existing products have cheaper open-source alternatives. Sometimes, an investment is worthwhile, such as an intrusion-detection system that scans her district鈥檚 online traffic, identifies threats, and paints a picture of the district鈥檚 normal traffic patterns. Tebbenkamp said the investment was small but the district got a lot out of it.
Monitoring
More than half of survey respondents said they鈥檙e engaged in real-time monitoring to detect security threats. School networks present an overwhelming amount of information, Tebbenkamp said. It鈥檚 important to prioritize鈥攕he deputizes two people each morning to look at dashboards, scan daily reports, and flag items that appear out of the ordinary. Part of her team combs through news threads and weekly briefings; if one person doesn鈥檛 catch something, another might.
鈥淚 think the biggest piece is what data do you really need to be looking at. You need to establish: What logs should you be collecting and reviewing? What network activities do you need to be monitoring?鈥 Tebbenkamp said. She鈥檚 also resigned herself to accepting that 鈥渟omething slips through the cracks鈥 no matter how much monitoring takes place.
Budgeting
Resources are always at a premium in K-12 schools, which means finding adequate funds for cybersecurity initiatives can be challenging. Only 12 percent of survey respondents said their district has a budget line item for cybersecurity, and just 20 percent have created a cybersecurity team.
Tebbenkamp said in a perfect world, she would add a chief privacy officer, rather than having her network system administrator lead her security team, and hire a data-security specialist. More cybersecurity experts couldn鈥檛 hurt, she said. But she鈥檚 found success with designating a 鈥渃ore group of individuals鈥 on her broader team who have cybersecurity among their duties.
鈥淭hey鈥檙e not going to have all that knowledge, so you need all of your key knowledge stakeholders to be part of a team so you鈥檙e not making decisions in isolation,鈥 she said.
Added Hinsdale High鈥檚 Bockwoldt, 鈥淚鈥檝e seen that happen at so many places: You didn鈥檛 have the processes in place to take care of it. All of a sudden, something bad happens, you鈥檙e throwing all kinds of money at it,鈥 he said. 鈥淗aving that conversation at a cabinet level is extremely important.鈥